Nishant PatelohSINTohSINT is an abbreviation for Open-Source Intelligence. It is the procedure of conducting surveillance and observations by gathering and…Apr 9, 2023Apr 9, 2023
Nishant PatelGoogle DorkingGoogle Dorking is a means of looking for top secret content that is inaccessible using general searching strategies. This approach, also…Apr 9, 2023Apr 9, 2023
Nishant PatelConti RansomwareIn this room, we have been given with the ransomware note which was left on the machine.Mar 19, 2023Mar 19, 2023
Nishant PatelNew Hire Old ArtifactsIn this room we are going to analyze logs taking from a virtual machine assumingly was operated in the finance department of the set Widget…Mar 19, 2023Mar 19, 2023
Nishant PatelThreat Intelligence ToolIt is the process of getting the certain and proper tools that help us to understand the different patterns of the risks and threats that…Feb 27, 2023Feb 27, 2023
Nishant PatelPS Eclipse TryHackMe RoomIt is safe to say that the ransomware may have been infiltered the machine or Keegan’s machine specifically. It is either through direct…Feb 13, 2023Feb 13, 2023
Nishant PatelIntroduction to SIEMSIEM is also known as Security Information and Event Management System. It is basically used to collect different kinds of data from the…Feb 13, 2023Feb 13, 2023
Nishant PatelThreat IntelligenceThreat, the word itself is a threat to make things inconvenient. So, resolving any threat and the steps that are took to mitigate it are…Jan 30, 2023Jan 30, 2023